Applied Mathematical Modelling, Journal Year: 2024, Volume and Issue: unknown, P. 115847 - 115847
Published: Nov. 1, 2024
Language: Английский
Applied Mathematical Modelling, Journal Year: 2024, Volume and Issue: unknown, P. 115847 - 115847
Published: Nov. 1, 2024
Language: Английский
Fractal and Fractional, Journal Year: 2025, Volume and Issue: 9(2), P. 115 - 115
Published: Feb. 13, 2025
Memristor-based fractional-order chaotic systems can record information from the past, present, and future, describe real world more accurately than integer-order systems. This paper proposes a novel memristor model verifies its characteristics through pinched loop (PHL) method. Subsequently, new memristive Hopfield neural network (4D-FOMHNN) is introduced to simulate induced current, accompanied by Caputo’s definition of fractional order. An Adomian decomposition method (ADM) employed for system solution. By varying parameters order 4D-FOMHNN, rich dynamic behaviors including transient chaos, coexistence attractors are observed using methods such as bifurcation diagrams Lyapunov exponent analysis. Finally, proposed FOMHNN implemented on field-programmable gate array (FPGA), oscilloscope observation results consistent with MATLAB numerical simulation results, which further validate theoretical analysis provide basis application in field encryption.
Language: Английский
Citations
3Chaos Solitons & Fractals, Journal Year: 2025, Volume and Issue: 193, P. 116053 - 116053
Published: Feb. 6, 2025
Language: Английский
Citations
0Nonlinear Dynamics, Journal Year: 2025, Volume and Issue: unknown
Published: Feb. 14, 2025
Language: Английский
Citations
0Cognitive Neurodynamics, Journal Year: 2025, Volume and Issue: 19(1)
Published: April 18, 2025
Language: Английский
Citations
0The European Physical Journal Special Topics, Journal Year: 2024, Volume and Issue: unknown
Published: Aug. 16, 2024
Language: Английский
Citations
3Symmetry, Journal Year: 2024, Volume and Issue: 16(7), P. 868 - 868
Published: July 9, 2024
The symmetric multi-scroll strange attractor has shown great potential in chaos-based applications due to its high complexity phase space. Here, the approach of symmetrization is employed for doubling generate pseudo-multi-scroll attractors a discrete map, where carefully selected offset constant key organizing coexisting attractors. By choosing Hénon map and implementing digital circuit on microcontroller, this study fills significant gap research chaotic systems. performance further validated using pseudo-random number generator, demonstrating substantial academic contributions field chaos theory. Additionally, attractor-based squirrel search algorithm first developed, showcasing practical application mobile robot path planning. This work not only advances theoretical understanding systems but also provides methods implementation systems, offering valuable insights policy-making advanced robotic intelligent manufacturing.
Language: Английский
Citations
1Partial Differential Equations in Applied Mathematics, Journal Year: 2024, Volume and Issue: 11, P. 100866 - 100866
Published: Aug. 14, 2024
Language: Английский
Citations
1Physica Scripta, Journal Year: 2024, Volume and Issue: 99(12), P. 125263 - 125263
Published: Nov. 12, 2024
Abstract Current digital watermarking technologies mainly focus on the imperceptibility and robustness of watermark embedding, while security images is also worth further research. Considering nonlinear characteristics integration structure storage computation, memristors can be introduced into encryption algorithms to improve effect encryption. The paper proposes a double algorithm for color based MCNN (Memristive Cellular Neural Networks) Arnold transform, generates chaotic sequences image by introducing CNN (Cellular construct MCNN, scrambles using transform achieve pixel values positions, enhances images. Adopting SE (Spectral Entropy) complexity optimizes parameters improves performance algorithm. embedding extraction encrypted realized combining CT (Contourlet Transform) SVD (Singular Value Decomposition), which ability resist common attacks such as compression rotation attacks. Experiment results show proposed better maintain quality images, break statistical original generated key has good randomness. In addition, presented are highly sensitive key, attacks, differential exhaustive with security, imperceptibility.
Language: Английский
Citations
1Applied Mathematical Modelling, Journal Year: 2024, Volume and Issue: unknown, P. 115847 - 115847
Published: Nov. 1, 2024
Language: Английский
Citations
0